General

  • Target

    na.elf

  • Size

    70KB

  • Sample

    241010-hnm3aswbrn

  • MD5

    0bbfac65b706281404dc418e548e552a

  • SHA1

    a951aeda826d01cf2571f4ec2b1992cce76edc27

  • SHA256

    4fda35ed2d413b0d54f5f25b8bf9df56756ffc000eab4fcf7fc1894638f681db

  • SHA512

    a87eb0bca11548af7a211cf1d660ad48e3f3717cbb3659b171305626476e62e663d88daed30a0c56ccc381caa271aecfe3dbb4755b93ffd4a7a27537db0e2884

  • SSDEEP

    1536:+VjRvmd7qol1juyRDhC23Q/tnkqV3Zs43NVY:+/ed7qoldj0tnkqV39Y

Malware Config

Targets

    • Target

      na.elf

    • Size

      70KB

    • MD5

      0bbfac65b706281404dc418e548e552a

    • SHA1

      a951aeda826d01cf2571f4ec2b1992cce76edc27

    • SHA256

      4fda35ed2d413b0d54f5f25b8bf9df56756ffc000eab4fcf7fc1894638f681db

    • SHA512

      a87eb0bca11548af7a211cf1d660ad48e3f3717cbb3659b171305626476e62e663d88daed30a0c56ccc381caa271aecfe3dbb4755b93ffd4a7a27537db0e2884

    • SSDEEP

      1536:+VjRvmd7qol1juyRDhC23Q/tnkqV3Zs43NVY:+/ed7qoldj0tnkqV39Y

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Reads process memory

      Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.

MITRE ATT&CK Enterprise v15

Tasks